Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Oracle 1z0-1084-24 - Oracle Cloud Infrastructure 2024 Developer Professional

Page: 3 / 3
Total 100 questions

You deployed a Python application to an Oracle Container Engine for Kubernetes (OKE) cluster. However, while testing you found a bug, which you rectified and then created a new Docker image. You now need to ensure that if this new image does not work once deployed, you should be able to roll back to the previous version. Using kubect1, which strategy should you use?

A.

Blue/Green Deployment

B.

Canary Deployment

C.

Rolling Update

D.

A/B Testing

A DevOps engineer is troubleshooting the Meshifyd application, which is running in an Oracle Cloud Infrastructure (OCI) environment. The engineer has set up the OCI Logging service to store access logs for the application but notices that the logs from the Meshifyd application are not showing up in the logging service. The engineer suspects that there might be an issue with the logging configuration. Which two statements are potential reasons for logs from the Meshifyd application not showing up in the OCI Logging service?

A.

The logconfig.json file has incorrect or missing OCID for the custom log in the logobjectId field.

B.

The OCI Logging service is set up to pre access logs by creating a log group and custom log within the same compartment.

C.

The logconfig.json file has incorrect or missing information in the application namespace in the paths field.

D.

The logconfig.json file has incorrect or missing information in the application namespace in the src field.

E.

The logconfig.json file has incorrect or missing OCID for the custom log group in the logGroupObjectId field.

A service you are deploying to Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE) uses a docker image from a private repository in OCI Registry (OCIR). Which configuration is necessary to provide access to this repository from OKE?

A.

Create a docker-registry secret for OCIR with API key credentials on the cluster, and specify the imagePullSecret property in the application deployment manifest.

B.

Create a docker-registry secret for OCIR with identity Auth Token on the cluster, and specify the imagePullSecret property in the application deployment manifest.

C.

Create a dynamic group for nodes in the cluster, and a policy that allows the dynamic group to read repositories in the same compartment.

D.

Add a generic secret on the cluster containing your identity credentials. Then specify a registryCredentials property in the deployment manifest.

Which TWO are characteristics of microservices? (Choose two.)

A.

Microservices communicate over lightweight APIs.

B.

Microservices can be implemented in limited number of programming languages.

C.

All microservices share a data store.

D.

Microservices are hard to test in isolation.

E.

Microservices can be independently deployed.

Which TWO statements are true for serverless computing and serverless architectures? (Choose two.)

A.

Serverless function execution is fully managed by third party.

B.

Applications running on a FaaS (Functions as a Service) platform.

C.

Long running tasks are perfectly suited for serverless.

D.

Application DevOps team is responsible for scaling.

E.

Serverless function state should never be stored externally.

Which of these is NOT a valid authentication method for accessing an OCI API Gateway deployment?

A.

HTTP Basic

B.

API Key

C.

OAuth

D.

SAML Token

As a developer, you have been tasked with implementing a microservices-based application. Which THREE technologies are best suited to accomplish the task? (Choose three.)

A.

Terraform

B.

Big Data

C.

Anomaly Detection

D.

Service Mesh

E.

Docker

F.

Kubemetes

In the shared responsibility model, who should perform patching, upgrading, and maintaining of the worker nodes in provisioned Oracle Container Engine for Kubernetes (OKE) clusters?

A.

Oracle Support does it.

B.

It is the responsibility of the customer.

C.

It is an automated process.

(CHK_4>2) You have a scenario where a DevOps team wants to store secrets in Oracle Cloud Infrastructure (OCI) Vault so that it can inject the secrets into an app's environment variables (for example, MYSQL_DB_PASSWD) at deployment time. Which is NOT valid about managing secrets in the OCI Vault service?

A.

New secret versions automatically expire in 90 days unless you configure an expiry rule.

B.

You can manually create new secrets as well as new secret versions using the OCI Console:

C.

A unique OCID is automatically generated for each secret and remains unchanged even when creating a new secret version.

D.

A secret reuse rule prevents the use of secret contents across different versions of a secret.

You are tasked with developing an application that requires the use of Oracle Cloud Infrastructure (OCI) APIs to POST messages to a stream in the OCI Streaming service. Which statement is incorrect? (Choose the best answer.)

A.

The Content-Type header must be set to application/json

B.

The request must include an authorization signing string including (but not limited to) x-content-sha256, content-type, and content-length headers.

C.

The request does not require an Authorization header.

D.

An HTTP 401 will be returned if the client's clock is skewed more than 5 minutes from the server's.